Essays about: "risk perceptions"

Showing result 1 - 5 of 218 essays containing the words risk perceptions.

  1. 1. Potential and Limitations of the Sketch Map Tool in the International Red Cross Red Crescent Movement

    University essay from Lunds universitet/Avdelningen för Riskhantering och Samhällssäkerhet

    Author : Kimon Letzner; [2024]
    Keywords : Disaster risk reduction; Participatory action research; Community risk mapping; International Red Cross Red Crescent Movement; Colombia; Technology and Engineering;

    Abstract : In disaster risk management, participatory mapping (PM) closes spatial data gaps in communities by integrating local risk knowledge. The thesis examined the potential and limitations of the Sketch Map Tool (SMT) as a PM tool for community-based disaster risk reduction (DRR) through an International Red Cross Red Crescent Movement case study. READ MORE

  2. 2. IT security expert’s perceptions of cybersecurity when working remotely compared to working in the office : A quality study on Swedish insurance companies

    University essay from Uppsala universitet/Informationssystem

    Author : Kristoffer Kullander; Mathilda Cselenyi; [2024]
    Keywords : Cyber security; cyber threats; cybersecurity awareness; remote work; Protection Motivation Theory; Cybersäkerhet; cyberhot; säkerhetsmedvetenhet; distansarbete; Protection Motivation Theory;

    Abstract : Teleworking has become a significant aspect of working life, especially after the outbreak of the COVID-19 pandemic, which accelerated the trend of teleworking. However, this shift has increased the risk of cyber threats and security risks. READ MORE

  3. 3. To Deploy, or Not to Deploy, That is the Question A qualitative study of the decision-making experiences of engineers deploying software changes in production

    University essay from Lunds universitet/Avdelningen för Riskhantering och Samhällssäkerhet

    Author : Jessica Ann DeVita; [2024]
    Keywords : Automation; Common ground; Complexity; Coordination; COVID19 pandemic; Deployment decision; Incident response; Mental model; Naturalistic decision-making; Phenomenology; Resilience; Risk; Software engineering; SRE; Strategy; Temporal reasoning; Uncertainty; Web operations; FLMU06; Technology and Engineering;

    Abstract : The web services that millions of people count on require large-scale computer resources (servers, nodes, networking) and an intricate set of interdependent software services. Under pressure to continually improve these services, code and configuration changes are deployed hundreds or thousands of times every day. READ MORE

  4. 4. Peers, Privacy & Pleasure: A mapping of how social norms influence consumers in their diffusion of a social media application with privacy implications, the case of TikTok

    University essay from Göteborgs universitet/Graduate School

    Author : Axel Fohlin; Carl Klittmar; [2023-07-03]
    Keywords : Social Norms; Injunctive Norms; Descriptive Norms; Personal Norms; Privacy Implication; Privacy Concern; Privacy Risk; Diffusion of Innovation; TikTok;

    Abstract : TikTok, the social media network where users can post and share user created content with one another, has fallen under examination of governments across the globe due to rising distress in regards to the privacy implications that the app may have. Understanding how TikTok reached such success even with an apparent privacy implication calls for a mapping of the social norms (Injunctive, Descriptive, Personal) and how they shaped consumer perceptions. READ MORE

  5. 5. Navigating the Risks of Dark Data : An Investigation into Personal Safety

    University essay from Linnéuniversitetet/Institutionen för informatik (IK)

    Author : Anshu Gautam; [2023]
    Keywords : Dark data; Hidden data; Big data; Unstructured data; Missing data; Privacy; Cybersecurity; Personal data; Data storage; Consumer protection;

    Abstract : With the exponential proliferation of data, there has been a surge in data generation fromdiverse sources, including social media platforms, websites, mobile devices, and sensors.However, not all data is readily visible or accessible to the public, leading to the emergence ofthe concept known as "dark data. READ MORE